Woman looking at computer screen

Cyber Security Technician – Level 3 Apprenticeship

For more information, please contact:


01245 254 875





Course Level:


Maximum Funding For Employers:


Typical Duration:

18 months




Face-to-face, remote or a blended approach.

Entry Requirements:

Minimum entry is Level 1 English and Maths without level 2 English and maths will need to achieve this level prior to taking the End- Point Assessment. For those with an education, health and care plan or a legacy statement. The apprenticeship’s English and maths minimum requirement is Entry Level 3.


You must be:

  • 16 or over by the end of the summer holidays.
  • Living in England.
  • Not in full-time education.


Cyber security technicians are found in all sectors where information is held digitally and where that information is an asset that needs to be protected.Providing first line cyber security support, individuals are required to to monitor and detect potential security threats, implement cyber security mechanisms and apply cyber security procedures and controls.

An employee in this occupation interacts with a wide range of stakeholders including colleagues, managers, customers and internal and external suppliers.

This apprenticeship is designed to enable learners to contribute to the delivery of a security culture across an organisation, understanding vulnerabilities and threats and supporting the development of an organisation’s cyber security maturity.

Teaching and learning

  • You will be allocated a dedicated Skills Teaching Assessor.
  • An individual learning plan developed with you and your Skills Teaching Assessor.
  • Formal progress reviews with your assessor every 8-10 weeks.
  • Coaching and mentoring forms an integral part of your individual learning journey to ensure you have the most appropriate guidance and support to complete your programme.
  • Mutually agreed SMART targets that take into consideration your individual ambitions and career goals.

Additional off-the-job training

  • Practical training.
  • Shadowing.
  • Coaching and mentoring.
  • Online learning.
  • Support with assessment.

Who it's for:

Typical job roles include access control administrator, cyber security administrator, incident response technician, junior security analyst.

Knowledge, Skills and Behaviours:

  • Knowledge – Cyber security policies and standards based on an Information Security Management System (ISMS); principles of cyber security compliance and compliance  monitoring techniques; cryptography, certificates and use of certificate management tools; disaster prevention and recovery methods; computer forensic principles.
  • Skills – Follow information security procedures; maintain information security controls; develop information security training and awareness resources; follow technical procedures to install and maintain technical security controls; cyber security vulnerability assessments; perform cyber security compliance checks.
  • Behaviours – Manage own time to meet deadlines and manage stakeholder expectations; work independently and take responsibility for own actions within the occupation; act in accordance with occupation specific laws, regulations and professional standards; review own development needs in order to keep up to date with evolution in technologies, trends and innovation.

Download the full occupational standard.


At the end of your programme you will complete an end-point assessment with an independent assessment organisation, agreed by your employer.

Download the full Assessment Plan here.

Progression/Career Path:

Successful completion of the Level 3 could lead to a Level 4 and 6 Degree Apprenticeship standard and full time employment in the cyber sector.

Contact Us

Contact us

Please complete the form below and one of our team will be in contact you, alternatively please email info@ixionholdings.com.

By ticking this box I agree that Ixion Holdings can contact me using the information I have provided. Any data I provide to Ixion Holdings will be kept safe and secure and will only by used by Ixion Holdings. To find out more please take a look at our Privacy Policy.
Skip to content